QUESTION 183Ann, a user, states that her machine has been behaving erratically over the past week. She has experienced slowness and input lag and found text files that appear to contain pieces of her emails or online conversations with coworkers. The technician runs a standard virus scan but detects nothing. Which of the following types of malware has infected the machine?

A. RansomwareB. RootkitC. BackdoorD. Keylogger

Answer: D

QUESTION 184An information security specialist is reviewing the following output from a Linux server.

Based on the above information, which of the following types of malware was installed on the server?

A. Logic bombB. TrojanC. BackdoorD. RansomwareE. Rootkit

Answer: A

QUESTION 185In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?

QUESTION 186A system administrator wants to provide for and enforce wireless access accountability during events where external speakers are invited to make presentations to a mixed audience of employees and non-employees. Which of the following should the administrator implement?

QUESTION 188A security analyst observes the following events in the logs of an employee workstation:

Given the information provided, which of the following MOST likely occurred on the workstation?

A. Application whitelisting controls blocked an exploit payload from executing.B. Antivirus software found and quarantined three malware files.C. Automatic updates were initiated but failed because they had not been approved.D. The SIEM log agent was not turned properly and reported a false positive.

Answer: A

QUESTION 189When identifying a company’s most valuable assets as part of a BIA, which of the following should be the FIRST priority?